default search action
Jing Hu 0007
Person information
- affiliation: Tianjin University, School of Computer Science and Technology, China
Other persons with the same name
- Jing Hu — disambiguation page
- Jing Hu 0001 — Utah State University, Department of Computer Science, Logan, UT, USA
- Jing Hu 0002 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Jing Hu 0003 — Wuhan University of Science and Technology, School of Computer Science and Technology, China
- Jing Hu 0004 — Beijing Forestry University, School of Information Science and Technology, China (and 1 more)
- Jing Hu 0005 — Xi'an University of Technology, Shaanxi Key Laboratory for Network Computing and Security Technology, School of Computer Science and Engineering, China (and 1 more)
- Jing Hu 0006 — University of Birmingham, UK
- Jing Hu 0008 — Jinan University, First Affiliated Hospital, Department of Acupuncture and Moxibustion, Guangzhou, China
- Jing Hu 0009 — Chengdu University of Information Technology, Department of Computer Science,China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c13]Xueqi Gao, Chao Xu, Yihang Song, Jing Hu, Jian Xiao, Zhaopeng Meng:
Node-Wise Domain Adaptation Based on Transferable Attention for Recognizing Road Rage via EEG. ICASSP 2023: 1-5 - 2022
- [c12]Zihang Wan, Chao Xu, Jing Hu, Jian Xiao, Zhaopeng Meng, Jitai Chen:
Multi-view Stereo Network with Attention Thin Volume. PRICAI (3) 2022: 410-423 - [i1]Xueqi Gao, Chao Xu, Yihang Song, Jing Hu, Jian Xiao, Zhaopeng Meng:
Node-wise Domain Adaptation Based on Transferable Attention for Recognizing Road Rage via EEG. CoRR abs/2212.02417 (2022) - 2021
- [j8]Ziqi Xu, Chao Xu, Jing Hu, Zhaopeng Meng:
Robust resistance to noise and outliers: Screened Poisson Surface Reconstruction using adaptive kernel density estimation. Comput. Graph. 97: 19-27 (2021) - [c11]Kanghui Zeng, Chao Xu, Jing Hu, Yushi Li, Zhaopeng Meng:
L-DPSNet: Deep Photometric Stereo Network via Local Diffuse Reflectance Maxima. ICONIP (5) 2021: 89-97 - 2020
- [j7]Zhe Liang, Chao Xu, Jing Hu, Yushi Li, Zhaopeng Meng:
Better Together: Shading Cues and Multi-View Stereo for Reconstruction Depth Optimization. IEEE Access 8: 112348-112356 (2020) - [j6]Longpeng Li, Guangquan Xu, Litao Jiao, Xiaotong Li, Hao Wang, Jing Hu, Hequn Xian, Wenjuan Lian, Honghao Gao:
A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems. IEEE Trans. Ind. Informatics 16(3): 2091-2101 (2020) - [c10]Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu:
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations. ASE 2020: 524-535
2010 – 2019
- 2019
- [j5]Meng Xing, Jing Hu, Zhiyong Feng, Yong Su, Weilong Peng, Jinqing Zheng:
Dynamic hand gesture recognition using motion pattern and shape descriptors. Multim. Tools Appl. 78(8): 10649-10672 (2019) - [c9]Ying Wang, Jing Hu, Xiaohong Li, Zhiyong Feng:
An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET. CollaborateCom 2019: 799-815 - 2018
- [j4]Xingxing Zhang, Chao Xu, Wanli Xue, Jing Hu, Yongchuan He, Mengxin Gao:
Emotion Recognition Based on Multichannel Physiological Signals with Comprehensive Nonlinear Processing. Sensors 18(11): 3886 (2018) - 2017
- [j3]Jinqing Zheng, Zhiyong Feng, Chao Xu, Jing Hu, Weimin Ge:
Fusing shape and spatio-temporal features for depth-based dynamic hand gesture recognition. Multim. Tools Appl. 76(20): 20525-20544 (2017) - 2016
- [c8]Jing Hu, Liang Li, Xiaotong Li, Chi Zhang, Weichao Liu, Zhiyong Fu:
BabyTalk: Interactive Design of Intelligent Toys for Pre-school Children in China. CCHI 2016: 8:1-8:9 - 2015
- [c7]Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. SecureComm 2015: 559-562 - [c6]Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor. TrustCom/BigDataSE/ISPA (1) 2015: 33-40 - 2014
- [j2]Chengwei Zhang, Xiaohong Li, Jing Hu, Zhiyong Feng, Jiaojiao Song:
Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols. J. Appl. Math. 2014: 138370:1-138370:10 (2014) - [j1]Xiaoru Li, Xiaohong Li, Guangquan Xu, Jing Hu, Zhiyong Feng:
Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol. J. Appl. Math. 2014: 983204:1-983204:10 (2014) - [c5]Gang Shen, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng:
An Extended UML Method for the Verification of Security Protocols. ICECCS 2014: 19-28 - [c4]Xiaofei Wu, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng:
OOPN-SRAM: A Novel Method for Software Risk Assessment. ICECCS 2014: 150-153 - [c3]Zhuobing Han, Xiaohong Li, Ruitao Feng, Jing Hu, Guangquan Xu, Zhiyong Feng:
A Three-Dimensional Model for Software Security Evaluation. TASE 2014: 34-41 - 2013
- [c2]Changxiao Du, Xiaohong Li, Hong Shi, Jing Hu, Ruitao Feng, Zhiyong Feng:
Architecture Security Evaluation Method Based on Security of the Components. APSEC (1) 2013: 523-528 - [c1]Lu Yan, Xiaohong Li, Ruitao Feng, Zhiyong Feng, Jing Hu:
Detection Method of the Second-Order SQL Injection in Web Applications. SOFL+MSVL 2013: 154-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint